An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)
☆24Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for firmanal
Users that are interested in firmanal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Cheat Sheets of the tools/programming languages☆12Jul 8, 2018Updated 7 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- security machine learning☆72May 15, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 7 years ago
- ☆15Dec 22, 2015Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 5 years ago
- gnu radio files☆12Oct 6, 2015Updated 10 years ago
- Firmware analysis website + API☆43Oct 1, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- ☆25Dec 7, 2019Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆41Oct 13, 2022Updated 3 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,060Jul 21, 2024Updated last year
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- ☆14Mar 31, 2018Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- ☆23May 20, 2016Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Flex 'em lexers☆42Oct 19, 2020Updated 5 years ago
- Dynamic Symbolic Execution of Android Apps☆24Jan 16, 2016Updated 10 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆257Oct 29, 2023Updated 2 years ago
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 9 months ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago